Abstract is missing.
- CydiOS: A Model-Based Testing Framework for iOS AppsShuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo. 1-13 [doi]
- Improving Bit-Blasting for Nonlinear Integer ConstraintsFuqi Jia, Rui Han, Pei Huang 0002, Minghao Liu 0001, Feifei Ma, Jian Zhang. 14-25 [doi]
- CONCORD: Clone-Aware Contrastive Learning for Source CodeYangruibo Ding, Saikat Chakraborty, Luca Buratti, Saurabh Pujar, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray. 26-38 [doi]
- Towards Efficient Fine-Tuning of Pre-trained Code Models: An Experimental Study and BeyondEnsheng Shi, Yanlin Wang, Hongyu Zhang 0002, Lun Du, Shi Han, Dongmei Zhang 0001, Hongbin Sun 0001. 39-51 [doi]
- Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper)Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang. 52-63 [doi]
- Pattern-Based Peephole Optimizations with Java JIT TestsZhiqiang Zang, Aditya Thimmaiah, Milos Gligoric 0001. 64-75 [doi]
- Icicle: A Re-designed Emulator for Grey-Box Firmware FuzzingMichael Chesser, Surya Nepal, Damith C. Ranasinghe. 76-88 [doi]
- Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax TreeTiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu, Bin Yuan, Deqing Zou, Hai Jin 0001. 89-100 [doi]
- Reducing the Memory Footprint of IFDS-Based Data-Flow Analyses using Fine-Grained Garbage CollectionDongjie He, Yujiang Gui, Yaoqing Gao, Jingling Xue. 101-113 [doi]
- Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static AnalysisJiangchao Liu, Jierui Liu, Peng Di, Diyu Wu, Hengjie Zheng, Alex X. Liu, Jingling Xue. 114-126 [doi]
- Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability PredictionStephan Lipp, Daniel Elsner, Severin Kacianka, Alexander Pretschner, Marcel Böhme, Sebastian Banescu. 127-139 [doi]
- Testing Graph Database Engines via Query PartitioningMatteo Kamm, Manuel Rigger, Chengyu Zhang, Zhendong Su 0001. 140-149 [doi]
- Semantic-Based Neural Network RepairRichard Schumi, Jun Sun 0001. 150-162 [doi]
- GDsmith: Detecting Bugs in Cypher Graph Database EnginesZiyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, Tao Xie 0001. 163-174 [doi]
- Loop Invariant Inference through SMT Solving Enhanced Reinforcement LearningShiwen Yu, Ting Wang 0009, Ji Wang 0001. 175-187 [doi]
- CODEP: Grammatical Seq2Seq Model for General-Purpose Code GenerationYihong Dong, Ge Li 0001, Zhi Jin. 188-198 [doi]
- Concept-Based Automated Grading of CS-1 Programming AssignmentsZhiyu Fan, Shin Hwei Tan, Abhik Roychoudhury. 199-210 [doi]
- Beware of the Unexpected: Bimodal Taint AnalysisYiu Wai Chow, Max Schäfer, Michael Pradel. 211-222 [doi]
- DeUEDroid: Detecting Underground Economy Apps Based on UTG SimilarityZhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin. 223-235 [doi]
- Dependency-Aware Metamorphic Testing of Datalog EnginesMuhammad Numair Mansur, Valentin Wüstholz, Maria Christakis. 236-247 [doi]
- Fuzzing Deep Learning Compilers with HirGenHaoyang Ma, Qingchao Shen, Yongqiang Tian 0001, Junjie Chen 0003, Shing-Chi Cheung. 248-260 [doi]
- API2Vec: Learning Representations of API Sequences for Malware DetectionLei Cui 0003, Jiancong Cui, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding. 261-273 [doi]
- June: A Type Testability Transformation for Improved ATG PerformanceDan Bruce, David Kelly, Héctor D. Menéndez, Earl T. Barr, David Clark 0001. 274-284 [doi]
- A Comprehensive Study on Quality Assurance Tools for JavaHan Liu, Sen Chen, Ruitao Feng, Chengwei Liu, Kaixuan Li, Zhengzi Xu, Liming Nie, Yang Liu, Yixiang Chen. 285-297 [doi]
- Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and FuzzingMingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, Huizhong Li. 298-309 [doi]
- FairRec: Fairness Testing for Deep Recommender SystemsHuizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang 0002, Zehong Hu, Rong Zhang, Hui Xue 0001. 310-321 [doi]
- ItyFuzz: Snapshot-Based Fuzzer for Smart ContractChaofan Shou, Shangyin Tan, Koushik Sen. 322-333 [doi]
- Who Judges the Judge: An Empirical Study on Online Judge TestsKaibo Liu, Yudong Han, Jie M. Zhang, Zhenpeng Chen, Federica Sarro, Mark Harman, Gang Huang, Yun Ma 0002. 334-346 [doi]
- Precise and Efficient Patch Presence Test for Android Applications against Code ObfuscationZifan Xie, Ming Wen 0001, Haoxiang Jia, Xiaochen Guo, Xiaotong Huang, Deqing Zou, Hai Jin 0001. 347-359 [doi]
- Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias AnalysisKai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu 0005, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun. 360-372 [doi]
- Definition and Detection of Defects in NFT Smart ContractsShuo Yang, Jiachi Chen, Zibin Zheng. 373-384 [doi]
- Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly BinariesNingyu He, Zhehao Zhao, Jikai Wang, Yubin Hu 0003, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo 0001. 385-397 [doi]
- Type Batched Program ReductionGolnaz Gharachorlu, Nick Sumner. 398-410 [doi]
- Automatically Reproducing Android Bug Reports using Natural Language Processing and Reinforcement LearningZhaoxu Zhang, Robert Winn, Yu Zhao 0010, Tingting Yu, William G. J. Halfond. 411-422 [doi]
- Large Language Models Are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language ModelsYinlin Deng, Chunqiu Steven Xia, Haoran Peng, Chenyuan Yang, Lingming Zhang 0001. 423-435 [doi]
- Exploring Missed Optimizations in WebAssembly OptimizersZhibo Liu, Dongwei Xiao, Zongjie Li, Shuai Wang, Wei Meng. 436-448 [doi]
- PhysCov: Physical Test Coverage for Autonomous VehiclesCarl Hildebrandt, Meriel von Stein, Sebastian G. Elbaum. 449-461 [doi]
- Building Critical Testing Scenarios for Autonomous Driving from Real AccidentsXudong Zhang, Yan Cai 0001. 462-474 [doi]
- CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training RefinementXuanqi Gao, Juan Zhai, ShiQing Ma, Chao Shen 0001, Yufei Chen 0001, Shiwei Wang. 475-487 [doi]
- BehAVExplor: Behavior Diversity Guided Testing for Autonomous Driving SystemsMingfei Cheng, Yuan Zhou, Xiaofei Xie. 488-500 [doi]
- In Defense of Simple Techniques for Neural Network Test Case SelectionShenglin Bao, Chaofeng Sha, Bihuan Chen 0001, Xin Peng 0001, Wenyun Zhao. 501-513 [doi]
- ConfFix: Repairing Configuration Compatibility Issues in Android AppsHuaxun Huang, Chi Xu, Ming Wen, Yepang Liu 0001, Shing-Chi Cheung. 514-525 [doi]
- Vectorizing Program Ingredients for Better JVM TestingTianchang Gao, Junjie Chen 0003, Yingquan Zhao, Yuqun Zhang, Lingming Zhang 0001. 526-537 [doi]
- What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile ApplicationsLinlin Li, Ruifeng Wang, Xian Zhan, Ying Wang 0038, Cuiyun Gao, Sinan Wang, Yepang Liu 0001. 538-550 [doi]
- Testing the Compiler for a New-Born Programming Language: An Industrial Case Study (Experience Paper)Yingquan Zhao, Junjie Chen, Ruifeng Fu, Haojie Ye, Zan Wang. 551-563 [doi]
- Quantitative Policy Repair for Access Control on the CloudWilliam Eiers, Ganesh Sankaran, Tevfik Bultan. 564-575 [doi]
- Validating Multimedia Content Moderation Software via Semantic FusionWenxuan Wang, Jingyuan Huang, Chang Chen, Jiazhen Gu, Jianping Zhang, Weibin Wu, Pinjia He, Michael R. Lyu. 576-588 [doi]
- Towards More Realistic Evaluation for Neural Test Oracle GenerationZhongxin Liu, Kui Liu 0001, Xin Xia 0001, Xiaohu Yang 0001. 589-600 [doi]
- Back Deduction Based Testing for Word Sense Disambiguation Ability of Machine Translation SystemsJun Wang, Yanhui Li, Xiang Huang, Lin Chen, Xiaofang Zhang, Yuming Zhou. 601-613 [doi]
- DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph OptimizationSimin Chen, Shiyi Wei, Cong Liu, Wei Yang 0013. 614-626 [doi]
- Systematically Producing Test Orders to Detect Order-Dependent Flaky TestsChengpeng Li, M. Mahdi Khosravi, Wing Lam, August Shi. 627-638 [doi]
- Security Checking of Trigger-Action-Programming Smart Home IntegrationsLei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li. 639-651 [doi]
- LiResolver: License Incompatibility Resolution for Open Source SoftwareSihan Xu, Ya Gao, Lingling Fan, Linyu Li, Xiangrui Cai, Zheli Liu. 652-663 [doi]
- More Precise Regression Test Selection via Reasoning about Semantics-Modifying ChangesYu Liu, Jiyang Zhang 0003, Pengyu Nie 0001, Milos Gligoric 0001, Owolabi Legunsen. 664-676 [doi]
- Silent Compiler Bug De-duplication via Three-Dimensional AnalysisChen Yang, Junjie Chen, Xingyu Fan, Jiajun Jiang, Jun Sun. 677-689 [doi]
- ACETest: Automated Constraint Extraction for Testing Deep Learning OperatorsJingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo. 690-702 [doi]
- DDLDroid: Efficiently Detecting Data Loss Issues in Android AppsYuhao Zhou, Wei Song. 703-714 [doi]
- To Kill a Mutant: An Empirical Study of Mutation Testing KillsHang Du, Vijay Krishna Palepu, James A. Jones. 715-726 [doi]
- iSyn: Semi-automated Smart Contract Synthesis from Legal Financial AgreementsPengcheng Fang, Zhenhua Zou, Xusheng Xiao, Zhuotao Liu. 727-739 [doi]
- RefBERT: A Two-Stage Pre-trained Framework for Automatic Rename RefactoringHao Liu, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li, Rongrong Ji. 740-752 [doi]
- CoopHance: Cooperative Enhancement for Robustness of Deep Learning SystemsQuan Zhang, Yongqiang Tian 0001, Yifeng Ding, Shanshan Li, Chengnian Sun, Yu Jiang 0001, Jiaguang Sun. 753-765 [doi]
- ROME: Testing Image Captioning Systems via Recursive Object MeltingBoxi Yu, Zhiqing Zhong, Jiaqi Li, Yixing Yang, Shilin He, Pinjia He. 766-778 [doi]
- GPUHarbor: Testing GPU Memory Consistency at Large (Experience Paper)Reese Levine, Mingun Cho, Devon McKee, Andrew Quinn 0001, Tyler Sorensen 0002. 779-791 [doi]
- COME: Commit Message Generation with Modification EmbeddingYichen He, Liran Wang, Kaiyi Wang, Yupeng Zhang, Hang Zhang, Zhoujun Li 0001. 792-803 [doi]
- OCFI: Make Function Entry Identification Hard AgainChengbin Pang, Tiantai Zhang, Xuelan Xu, Linzhang Wang, Bing Mao. 804-815 [doi]
- Catamaran: Low-Overhead Memory Safety Enforcement via Parallel AccelerationYiyu Zhang, Tianyi Liu, Zewen Sun, Zhe Chen, Xuandong Li, Zhiqiang Zuo 0002. 816-828 [doi]
- Latent Imitator: Generating Natural Individual Discriminatory Instances for Black-Box Fairness TestingYisong Xiao, Aishan Liu, Tianlin Li, Xianglong Liu 0001. 829-841 [doi]
- Simulation-Based Validation for Autonomous Driving SystemsChangwen Li, Joseph Sifakis, Qiang Wang, Rongjie Yan, Jian Zhang. 842-853 [doi]
- Automated Program Repair from Fuzzing PerspectiveYoungjae Kim, Seungheon Han, Askar Yeltayuly Khamit, Jooyong Yi. 854-866 [doi]
- 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential FuzzingSongtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang. 867-879 [doi]
- A Bayesian Framework for Automated DebuggingSungmin Kang, WonKeun Choi, Shin Yoo. 880-891 [doi]
- That's a Tough Call: Studying the Challenges of Call Graph Construction for WebAssemblyDaniel Lehmann 0002, Michelle Thalakottur, Frank Tip, Michael Pradel. 892-903 [doi]
- GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM TestingZihan Wang, Pengbo Nie, Xinyuan Miao, Yuting Chen, Chengcheng Wan, Lei Bu, Jianjun Zhao 0001. 904-916 [doi]
- Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware FeaturesYiming Zhang, Yuxin Hu, Haonan Li 0009, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang. 917-928 [doi]
- Guiding Greybox Fuzzing with Mutation TestingVasudev Vikram, Isabella Laybourn, Ao Li, Nicole Nair, Kelton OBrien, Rafaello Sanna, Rohan Padhye. 929-941 [doi]
- Testing Automated Driving Systems by Breaking Many Laws EfficientlyXiaodong Zhang, Wei Zhao, Yang Sun, Jun Sun 0019, Yulong Shen, Xuewen Dong, Zijiang Yang 0004. 942-953 [doi]
- DeepAtash: Focused Test Generation for Deep Learning SystemsTahereh Zohdinasab, Vincenzo Riccio, Paolo Tonella. 954-966 [doi]
- SBDT: Search-Based Differential Testing of Certificate Parsers in SSL/TLS ImplementationsChu Chen, Pinghong Ren, Zhenhua Duan, Cong Tian, Xu Lu, Bin Yu. 967-979 [doi]
- SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency AnalysisZeqin Liao, Sicheng Hao, Yuhong Nan, Zibin Zheng. 980-991 [doi]
- ωTest: WebView-Oriented Testing for Android ApplicationsJiajun Hu, Lili Wei, Yepang Liu 0001, Shing-Chi Cheung. 992-1004 [doi]
- ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based SystemsMingyi Zhou, Xiang Gao, Jing Wu, John C. Grundy, Xiao Chen, Chunyang Chen, Li Li 0029. 1005-1017 [doi]
- AGORA: Automated Generation of Test Oracles for REST APIsJuan C. Alonso, Sergio Segura, Antonio Ruiz Cortés. 1018-1030 [doi]
- Fuzzing Embedded Systems using Debug InterfacesMax Eisele, Daniel Ebert, Christopher Huth, Andreas Zeller. 1031-1042 [doi]
- Splendor: Static Detection of Stored XSS in Modern Web ApplicationsHe Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo. 1043-1054 [doi]
- Applying and Extending the Delta Debugging Algorithm for Elevator Dispatching Algorithms (Experience Paper)Pablo Valle, Aitor Arrieta, Maite Arratibel. 1055-1067 [doi]
- Finding Short Slow Inputs Faster with Grammar-Based SearchZiyad Alsaeed, Michal Young. 1068-1079 [doi]
- Transforming Test Suites into CroissantsYang Chen, Alperen Yildiz, Darko Marinov, Reyhaneh Jabbarvand. 1080-1092 [doi]
- Tai-e: A Developer-Friendly Static Analysis Framework for Java by Harnessing the Good Designs of ClassicsTian Tan, Yue Li. 1093-1105 [doi]
- Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction DeemphasisXiangzhe Xu, Shiwei Feng 0002, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng 0005, Guanhong Tao, Qingkai Shi, Zhuo Zhang 0002, Xiangyu Zhang 0001. 1106-1118 [doi]
- Data Constraint Mining for Automatic Reconciliation Scripts GenerationTianxiao Wang, Chen Zhi, Xiaoqun Zhou, Jinjie Wu, Jianwei Yin, ShuiGuang Deng. 1119-1130 [doi]
- Guided Retraining to Enhance the Detection of Difficult Android MalwareNadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein. 1131-1143 [doi]
- DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi ProtocolsQueping Kong, Jiachi Chen, Yanlin Wang, Zigui Jiang, Zibin Zheng. 1144-1156 [doi]
- Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart ContractsYuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang. 1157-1168 [doi]
- Synthesizing Speech Test Cases with Text-to-Speech? An Empirical Study on the False Alarms in Automated Speech Recognition TestingJulia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang 0003, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo 0001. 1169-1181 [doi]
- A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-ApproximationZhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, Min Zhang. 1182-1194 [doi]
- SlipCover: Near Zero-Overhead Code Coverage for PythonJuan Altmayer Pizzorno, Emery D. Berger. 1195-1206 [doi]
- Systematic Testing of the Data-Poisoning Robustness of KNNYannan Li, Jingbo Wang, Chao Wang. 1207-1218 [doi]
- GrayC: Greybox Fuzzing of Compilers and Analysers for CKarine Even Mendoza, Arindam Sharma, Alastair F. Donaldson, Cristian Cadar. 1219-1231 [doi]
- Enhancing REST API Testing with NLP TechniquesMyeongSoo Kim, Davide Corradini, Saurabh Sinha, Alessandro Orso, Michele Pasqua, Rachel Tzoref-Brill, Mariano Ceccato. 1232-1243 [doi]
- Automated Generation of Security-Centric Descriptions for Smart Contract BytecodeYu Pan, Zhichao Xu, Levi Taiji Li, Yunhe Yang, Mu Zhang 0001. 1244-1256 [doi]
- Toward Automated Detecting Unanticipated Price Feed in Smart ContractYifan Mo, Jiachi Chen, Yanlin Wang, Zibin Zheng. 1257-1268 [doi]
- Virtual Reality (VR) Automated Testing in the Wild: A Case Study on Unity-Based VR ApplicationsDhia Elhaq Rzig, Nafees Iqbal, Isabella Attisano, Xue-qin, Foyzul Hassan. 1269-1281 [doi]
- How Effective Are Neural Networks for Fixing Security VulnerabilitiesYi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan 0001, Petr Babkin, Sameena Shah. 1282-1294 [doi]
- Rare Path Guided FuzzingSeemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan. 1295-1306 [doi]
- CGuard: Scalable and Precise Object Bounds Protection for CPiyus Kedia, Rahul Purandare, Udit Kumar Agarwal, Rishabh. 1307-1318 [doi]
- An Empirical Study of Functional Bugs in Android AppsYiheng Xiong, Mengqian Xu, Ting Su 0001, Jingling Sun, Jue Wang, He Wen, Geguang Pu, Jifeng He 0001, Zhendong Su 0001. 1319-1331 [doi]
- NodeRT: Detecting Races in Node.js Applications PracticallyJingyao Zhou, Lei Xu 0003, Gongzheng Lu, Weifeng Zhang, Xiangyu Zhang 0001. 1332-1344 [doi]
- An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded SoftwareChao Li, Rui Chen, Boxiang Wang, Zhixuan Wang, Tingting Yu, Yunsong Jiang, Bin Gu 0006, Mengfei Yang. 1345-1356 [doi]
- CodeGrid: A Grid Representation of CodeAbdoul Kader Kaboré, Earl T. Barr, Jacques Klein, Tegawendé F. Bissyandé. 1357-1369 [doi]
- Detecting Condition-Related Bugs with Control Flow Graph Neural NetworkJian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun 0001, Xudong Liu, Chunming Hu, Yang Liu. 1370-1382 [doi]
- Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We?Ling Jiang, Hengchen Yuan, Qiyi Tang 0003, Sen Nie, Shi Wu, Yuqun Zhang. 1383-1395 [doi]
- Green Fuzzer BenchmarkingJiradet Ounjai, Valentin Wüstholz, Maria Christakis. 1396-1406 [doi]
- Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?Yutao Hu, Suyuan Wang, Wenke Li, Junru Peng, Yueming Wu, Deqing Zou, Hai Jin 0001. 1407-1419 [doi]
- An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript DetectorsKunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin 0001. 1420-1432 [doi]
- Understanding Breaking Changes in the WildDhanushka Jayasuriya, Valerio Terragni, Jens Dietrich 0001, Samuel Ou, Kelly Blincoe. 1433-1444 [doi]
- Improving Spectrum-Based Localization of Multiple Faults by Iterative Test Suite ReductionDylan Callaghan, Bernd Fischer. 1445-1457 [doi]
- Extracting Inline Tests from Unit TestsYu Liu, Pengyu Nie 0001, Anna Guo, Milos Gligoric 0001, Owolabi Legunsen. 1458-1470 [doi]
- DDLDroid: A Static Analyzer for Automatically Detecting Data Loss Issues in Android ApplicationsYuhao Zhou, Wei Song. 1471-1474 [doi]
- Behaviorally Typed State Machines in TypeScript for Heterogeneous SwarmsRoland Kuhn, Alan Darmasaputra. 1475-1478 [doi]
- ECSTATIC: Automatic Configuration-Aware Testing and Debugging of Static Analysis ToolsAustin Mordahl, Dakota Soles, Miao Miao, Zenong Zhang, Shiyi Wei. 1479-1482 [doi]
- RustSmith: Random Differential Compiler Testing for RustMayank Sharma, Pingshi Yu, Alastair F. Donaldson. 1483-1486 [doi]
- KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and OptimizationQinglong Wang, Runzhe Wang, Yuxi Hu, Xiaohai Shi, Zheng Liu, Tao Ma, Houbing Song, Heyuan Shi. 1487-1490 [doi]
- KDAlloc: The KLEE Deterministic Allocator: Deterministic Memory Allocation during Symbolic Execution and Test Case ReplayDaniel Schemmel, Julian Büning, Frank Busse, Martin Nowack, Cristian Cadar. 1491-1494 [doi]
- EDHOC-Fuzzer: An EDHOC Protocol State FuzzerKonstantinos Sagonas, Thanasis Typaldos. 1495-1498 [doi]
- MetaData262: Automatic Test Suite Selection for Partial JavaScript ImplementationsFrederico Ramos, Diogo Costa Reis, Miguel Trigo, António Morgado 0001, José Fragoso Santos. 1499-1502 [doi]
- RobotBT: Behavior-Tree-Based Test-Case Specification for the Robot FrameworkSven Peldszus, Noubar Akopian, Thorsten Berger. 1503-1506 [doi]
- TreeLine and SlackLine: Grammar-Based Performance Fuzzing on Coffee BreakZiyad Alsaeed, Michal Young. 1507-1510 [doi]
- Oven: Safe and Live Communication Protocols in Scala, using Synthetic Behavioural Type AnalysisFrancisco Ferreira, Sung-Shik Jongmans. 1511-1514 [doi]
- SymRustC: A Hybrid Fuzzer for RustFrédéric Tuong, Mohammad Omidvar Tehrani, Marco Gaboardi, Steven Y. Ko. 1515-1518 [doi]
- EvoSpex: A Search-Based Tool for Postcondition InferenceFacundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias. 1519-1522 [doi]
- PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build SystemSunzhou Huang, Xiaoyin Wang. 1523-1526 [doi]
- Quantitative Robustness Analysis of Neural NetworksMara Downing. 1527-1531 [doi]
- Automatic Testing and Benchmarking for Configurable Static Analysis ToolsAustin Mordahl. 1532-1536 [doi]
- Type AutomataOri Roth. 1537-1540 [doi]
- Harnessing Large Language Models for Simulink Toolchain Testing and Developing Diverse Open-Source Corpora of Simulink Models for Metric and Evolution AnalysisSohil Lal Shrestha. 1541-1545 [doi]
- Fairness Testing for Recommender SystemsHuizhong Guo. 1546-1548 [doi]
- Quantitative Symbolic Similarity AnalysisLaboni Sarker. 1549-1551 [doi]
- Reasoning about MLIR Semantics through Effects and HandlersPingshi Yu. 1552-1554 [doi]